Security

Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

What's New

Untitled Document

Oracle Weblogic SAML2 AuthorizationLuis Rodriguez illustrates how to authorize your users in Oracle Weblogic once they have been authenticated by creating the
java.security.Principals objects from the SSO response.posted Wed, 25 Feb 2015 14:47:13 +0000

Externalise the Security of Oracle ADF Applications Using Oracle Entitlements ServerGanesh Kamble's technical article shows you how you can use Oracle Entitlements Server (OES) to secure the resources of Oracle
Application Development Framework (ADF) applications, with a focus on creating policies for securing an ADF application, and
then storing those policies in Oracle Internet Directory.posted Mon, 16 Feb 2015 14:36:36 +0000

Fusion Applications User, Role Identity Flow and Initial Bulk LoadWhen implementing Fusion Applications (FA), enterprise user and role identity data from various HR applications must be migrated
to FA so that the users can become part of FA system and be able to use the application. This article by Veer Natarajan covers
the important steps in the process and offers helpful tips for a successful user and role load.posted Thu, 29 Jan 2015 17:01:03 +0000

Building a Scalable, Highly Available Oracle API Gateway
11g Infrastructure in a Cloud EnvironmentWith its focus on service protection, and its authentication mechanisms, message encryption, and security/policy functionalities, Oracle API Gateway (OAG)
11g can be a very powerful tool in the secure provisioning of services in the cloud. This article shows you how to create a cloud-based
OAG infrastructure, with high-availability and scalability support.posted Mon, 26 Jan 2015 14:14:36 +0000